- Authentication, Authorization, and Accountability
- Security: AAA
Универсальный русско-английский словарь. Академик.ру. 2011.
Универсальный русско-английский словарь. Академик.ру. 2011.
Health Insurance Portability and Accountability Act — The Health Insurance Portability and Accountability Act (HIPAA) was enacted by the U.S. Congress in 1996. According to the Centers for Medicare and Medicaid Services (CMS) website, Title I of HIPAA protects health insurance coverage for workers… … Wikipedia
Collaboration-oriented architecture — is a concept used to describe the design of a computer system that is designed to collaborate, or use services, from systems that are outside of your locus of control. Collaboration Oriented Architecture will often utilize Service Oriented… … Wikipedia
Cybercrime and Countermeasures — Cyber crime, or computer crime, refers to any crime that involves a computer and a network.[1] The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers, more precisely, to criminal exploitation of the … Wikipedia
Collaboration Oriented Architecture — This is a term used in the areas of information security, IT security, network security and computer security.Collaboration Oriented Architecture is a concept used to describe the design of a computer system that is designed to collaborate, or… … Wikipedia
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Web Access Management — is a subcategory of the broader Identity management space. Web Access Management controls access to Web resources, providing: * Authentication Management * Policy based Authorization * Audit Reporting Services (optional) * Single sign on… … Wikipedia
Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
Policy appliances — are technical control and logging mechanisms to enforce or reconcile policy rules (information use rules) and to ensure accountability in information systems. [The use of policy appliances in this context was first described in K. A. Taipale,… … Wikipedia
National Industrial Security Program — The National Industrial Security Program, or NISP, is the nominal authority (in the United States) for managing the needs of private industry to access classified information. The NISP was established in 1993 by Executive Order 12829.[1] The… … Wikipedia
Medical device — A medical device is a product which is used for medical purposes in patients, in diagnosis, therapy or surgery[citation needed]. Whereas medicinal products (also called pharmaceuticals) achieve their principal action by pharmacological, metabolic … Wikipedia